Share this with

Hackers are targeting porn fans by threatening to release Powerpoint presentations built entirely from pictures of their moments of ‘joy’.

Cyber-security experts have uncovered a ‘sextortion’ racket in which crooks target smut-watchers and ask them to hand over cash to stop a dirty dossier being set to friends, family and even work colleagues or professional contacts.

Victims are told to hand over hundreds of pounds or face the possibility of the world’s most embarrassing Powerpoint slides being released for everyone to gawp at.

‘I looked at the sites that you regularly visit and I was shocked by what I saw,’ the digital criminals said in an email to their targets.

You can tell a lot about a man by the size of his finger (PIcture: Getty)

‘You are a BIG pervert. Your fantasy is shifted away from the normal course.

‘I made a screenshot of the adult sites where you have fun. After that, I made a screenshot of your joys (using the camera of your device and glued them together.

Advertisement

Advertisement

‘Turned out amazing! You are spectacular!

‘As proof of my words, I made a video presentation in Powerpoint.’

VIctims are then asked to pay $381 (£300) to avoid having these slides sent to every contact in their device’s address book.

This is the email that’s being sent to hapless smut-hounds (Provider: Proofpoint)

Of course, the threats are a scam. The hackers haven’t really turned images of people watching porn into a Powerpoint presentation.

They are hoping to trick people into handing over money.

However, that’s not the only sting in the tail of this sextortion bid.

If victims click on the link to the Powerpoint slides, their device could be infected with malware called GandCrab – which then also demands a $500 payment.

The email is made to look more credible by using the victims’ email address and even providing details of their password.

‘This particular attack combines multiple layers of social engineering as vulnerable, frightened recipients are tricked into clicking the link to determine whether the sender actually has evidence of illicit activity,’ wrote researchers from the tech security firm Proofpoint.

‘Sextortion preys on the fears and insecurities of recipients, using stolen passwords and other social engineering tricks to convince recipients that their reputations are actually at risk.

‘Adding a URL linking to ransomware that purports to be a presentation showing the recipients illicit activities is a new technique, increasing the risk associated with this type of attack.

‘Individuals receiving sextortion emails should assume the sender does not actually possess screenshots or video of any compromising activity and should not click any links or open attachments to verify the sender’s claims.’